Bestselling author Michael Levin interviews David X Martin on how large enterprises can protect themselves from cyber attacks and develop cyber wellness.
Broken or misconfigured access controls can make private parts of a given website public when they’re not supposed to be. They are one of several methods cybercriminals use to breach computer systems.
A security threat is a possibility of danger that might harm the vulnerability of a computer system and breach the security to cause damage.
An intrusion prevention system (IPS) provides policies and rules for network traffic to alert a network administrator to suspicious traffic.
Vulnerabilities are the gates through which threats enter the enterprise. The more applications a company deploys, the more vulnerabilities it creates for itself.
A hacker is an unauthorized user who breaks into computer systems to steal, change or destroy information, often by installing dangerous malware without the knowledge or consent of the device’s rightful owner or user.
The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
Cyber crime occurs when a computer is the object of the crime or is used as a tool to commit an offense.
Ransomware is essentially digital extortion executed through software that uses encryption techniques to keep files — and entire systems — locked from use by their original owner, and holds them hostage.
Phishing attacks work by getting us to share sensitive information like our usernames and passwords, often against normal logic and reasoning, by using social engineering to manipulate our emotions, such as greed and fear. A typical phishing attack will start with an email spoofed, or faked, to look like it’s coming from a company you do business with or a trusted coworker.